If this is your first visit, be sure to
check out the Forum Rules by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

The taskbar changing colors could be from your attack. I noticed that when I ran autopwn against my xp box that the victim box got extremely slow, and sometimes very unstable. I think that this is due to the buffer overflow attacks that are being attempted against the vulnerabilities that were found with the initial nmap scan in autopwn.

I don't know of any way to undo the fast-track update...maybe reinstall it...not sure.

The meterpreter session is different than the command prompt. It has built in scripts that you can run through commands that make your life easier. I'd recommend becoming more familiar with meterpreter.

Once you have an "msf>" prompt, type "sessions -l -i". This should show you all of the sessions that you have AND which exploit was used against the box. You can then open up Metasploit by itself and reuse the exploits that are listed here. Doing so will give you a session, which you can double click on to get a C: prompt.

There may be an easier way to do this, but this way will work for getting a c: prompt.

Additionally, you should be able to type "execute -f cmd.exe -c -H -i" to achieve the same thing. Although, I cannot take credit for this, I got it from hxxp://forums.remote-exploit.org/newbie-area/21910-pentesting-documentation.html

hmm, I wonder if the svchost process is getting terminated somehow. If so, that would explain why the system is getting a countdown reboot screen. There may be other reasons, but that is the most common one that I have seen in the past.

I've read somewhere on this forum someone said that if you can't find any exploits for the OS, then look at the running services... don't remember who said it but there was also some info on how to best determine which services are active on the target system..

I'm glad to hear that it worked, but I'd still encourage you to learn the meterpreter shell inside and out. I think that it's WAY more powerful than just having a C: prompt, and automates a lot of simple tasks into a single command. Now that being said, there are still some things that I've found are easier to do in the C: prompt as well.